[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

L Golightly, P Modesti, R Garcia, V Chang - Cyber Security and Applications, 2023 - Elsevier
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …

[HTML][HTML] A graph empowered insider threat detection framework based on daily activities

W Hong, J Yin, M You, H Wang, J Cao, J Li, M Liu… - ISA transactions, 2023 - Elsevier
While threats from outsiders are easier to alleviate, effective ways seldom exist to handle
threats from insiders. The key to managing insider threats lies in engineering behavioral …

Patient assignment optimization in cloud healthcare systems: a distributed genetic algorithm

X Pang, YF Ge, K Wang, AJM Traina… - Health Information Science …, 2023 - Springer
Integrating Internet technologies with traditional healthcare systems has enabled the
emergence of cloud healthcare systems. These systems aim to optimize the balance …

A deep reinforcement learning-based wireless body area network offloading optimization strategy for healthcare services

Y Chen, S Han, G Chen, J Yin, KN Wang… - … Information Science and …, 2023 - Springer
Wireless body area network (WBAN) is widely adopted in healthcare services, providing
remote real-time and continuous healthcare monitoring. With the massive increase of …

Graph intelligence enhanced bi-channel insider threat detection

W Hong, J Yin, M You, H Wang, J Cao, J Li… - … Conference on Network …, 2022 - Springer
For an organization, insider intrusion generally poses far more detrimental threats than
outsider intrusion. Traditionally, insider threat is detected by analyzing logged user …

Blockchain-based secure and efficient scheme for medical data

M Gupta, RK Dwivedi - EAI Endorsed Transactions on Scalable …, 2023 - publications.eai.eu
Abstract Internet of Things (IoT) fog nodes are distributed near end-user devices to mitigate
the impacts of low delay, position awareness, and spatial spread, which aren't permitted by …

Insider threat detection using supervised machine learning algorithms

P Manoharan, J Yin, H Wang, Y Zhang… - Telecommunication …, 2023 - Springer
Insider threats refer to abnormal actions taken by individuals with privileged access,
compromising system data's confidentiality, integrity, and availability. They pose significant …

Elastic optimization for stragglers in edge federated learning

K Sultana, K Ahmed, B Gu… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
To fully exploit enormous data generated by intelligent devices in edge computing, edge
federated learning (EFL) is envisioned as a promising solution. The distributed collaborative …

Multi-step reinforcement learning-based offloading for vehicle edge computing

S Han, Y Chen, G Chen, J Yin… - 2023 15th …, 2023 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) system has recently attracted more attention. However, IoV
applications require massive computations within strict time limits. Computation energy …

Privacy-preserving data publishing: an information-driven distributed genetic algorithm

YF Ge, H Wang, J Cao, Y Zhang, X Jiang - World Wide Web, 2024 - Springer
The privacy-preserving data publishing (PPDP) problem has gained substantial attention
from research communities, industries, and governments due to the increasing requirements …